Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe
Resource
win10v2004-20230915-en
General
-
Target
5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe
-
Size
3.9MB
-
MD5
155121511bfe2ee4b5fad83b4488fa7f
-
SHA1
eedbf81a0210c9285cd28de764b745f15c0a826d
-
SHA256
5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949
-
SHA512
dc59c47da4e00bec8182ca36b2f45d46456f3c3b5e6f08f23543c3102dcd239c54d46afc7e8e32d76f51fd45f1da4202bb0ba5f2e9b0640766b1c7da29895ab4
-
SSDEEP
98304:Iz4VN7UPQ5SbWf+YFC5fNGdZcURzA5Z84:IeNQaf+HdEdZY84
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe 1660 5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe 1660 5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe"C:\Users\Admin\AppData\Local\Temp\5b48c4bc52911257231b55286b636351ea622ee36548e1898ea2837953caa949.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1660